Skip to content

Commit c588988

Browse files
authoredSep 23, 2020
Fix broken links in the docs folder (#9543)
* Fix broken links in the docs folder * Format markdown
1 parent f73889f commit c588988

File tree

3 files changed

+9
-14
lines changed

3 files changed

+9
-14
lines changed
 

‎docs/product/personas.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# Knative Serving Personas
22

33
When discussing user actions, it is often helpful to
4-
[define specific user roles](<https://en.wikipedia.org/wiki/Persona_(user_experience)>)
4+
[define specific user roles](https://en.wikipedia.org/wiki/Persona_%28user_experience%29)
55
who might want to do the action.
66

77
## Knative Serving Compute

‎docs/roadmap/scaling-2019.md

+2-7
Original file line numberDiff line numberDiff line change
@@ -125,10 +125,8 @@ replaced independently.
125125

126126
The current Knative integration with K8s HPA only supports CPU autoscaling.
127127
However it should be able to scale on concurrency as well. Ultimately, the HPA
128-
may be able to replace the Knative Autoscaler (KPA) entirely (see
129-
["make everything better"](https://github.com/knative/serving/blob/master/docs/roadmap/scaling-2018.md#references)).
130-
Additionally, HPA should be able to scale on user-provided custom metrics as
131-
well.
128+
may be able to replace the Knative Autoscaler (KPA) entirely. Additionally, HPA
129+
should be able to scale on user-provided custom metrics as well.
132130

133131
**Goal**: Knative HPA-class PodAutoscalers support concurrency autoscaling.
134132

@@ -158,9 +156,6 @@ upstream and get rid of the queue-proxy sidecar.
158156
However we're not doing that yet because the requirements haven't stablized
159157
enough yet. And it's still useful to have a component to innovate within.
160158

161-
See
162-
[2018 What We Are Not Doing Yet](https://github.com/knative/serving/blob/master/docs/roadmap/scaling-2018.md#what-we-are-not-doing-yet)
163-
164159
### Vertical Pod Autoscaling Beta
165160

166161
A serverless system should be able to run code efficiently. Knative has default

‎docs/runtime-contract.md

+6-6
Original file line numberDiff line numberDiff line change
@@ -180,14 +180,14 @@ Inbound network connectivity is assumed to use HTTP/1.1 compatible transport.
180180

181181
The container MUST accept HTTP/1.1 requests from the environment. The
182182
environment SHOULD
183-
[offer an HTTP/2.0 upgrade option](https://http2.github.io/http2-spec/#discover-http)
183+
[offer an HTTP/2.0 upgrade option](https://httpwg.org/specs/rfc7540.html#discover-http)
184184
(`Upgrade: h2c` on either the initial request or an `OPTIONS` request) on the
185185
same port as HTTP/1.1. The developer MAY specify this port at deployment; if the
186186
developer does not specify a port, the platform provider MUST provide a default.
187187
Only one inbound `containerPort`
188188
[SHALL](https://github.com/knative/serving/blob/master/test/conformance/runtime/container_test.go)
189189
be specified in the
190-
[`core.v1.Container`](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.10/#containerport-v1-core)
190+
[`core.v1.Container`](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.17/#containerport-v1-core)
191191
specification. The `hostPort` parameter
192192
[SHOULD NOT](https://github.com/knative/serving/blob/master/test/conformance/runtime/container_test.go)
193193
be set by the developer or the platform provider, as it can interfere with
@@ -198,16 +198,16 @@ The platform provider SHOULD configure the platform to perform HTTPS termination
198198
and protocol transformation e.g. between QUIC or HTTP/2 and HTTP/1.1. Developers
199199
ought not need to implement multiple transports between the platform and their
200200
code. Unless overridden by setting the
201-
[`name`](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.10/#containerport-v1-core)
201+
[`name`](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.17/#containerport-v1-core)
202202
field on the inbound port, the platform will perform automatic detection as
203203
described above. If the
204-
[`core.v1.Container.ports[0].name`](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.10/#containerport-v1-core)
204+
[`core.v1.Container.ports[0].name`](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.17/#containerport-v1-core)
205205
is set to one of the following values, HTTP negotiation will be disabled and the
206206
following protocol will be used:
207207

208208
- `http1`: HTTP/1.1 transport and will not attempt to upgrade to h2c..
209209
- `h2c`: HTTP/2 transport, as described in
210-
[section 3.4 of the HTTP2 spec (Starting HTTP/2 with Prior Knowledge)](https://http2.github.io/http2-spec/#known-http)
210+
[section 3.4 of the HTTP2 spec (Starting HTTP/2 with Prior Knowledge)](https://httpwg.org/specs/rfc7540.html#known-http)
211211

212212
Developers ought to use automatic content negotiation where available, and MUST
213213
NOT set the `name` field to arbitrary values, as additional transports might be
@@ -260,7 +260,7 @@ environment specific information.
260260
#### Meta Requests
261261

262262
The
263-
[`core.v1.Container`](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.10/#container-v1-core)
263+
[`core.v1.Container`](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.17/#container-v1-core)
264264
object allows specifying both a
265265
[`readinessProbe`](https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#define-readiness-probes)
266266
and a

0 commit comments

Comments
 (0)
Please sign in to comment.